50 ways to leak your data: an exploration of apps’ circumvention of the Android permissions system
The Morning Paper
SEPTEMBER 24, 2019
USENIX Security Symposium 2019. There are four main parts to the story here: The testing environment that runs apps in a ‘honeypot’ and figures out which of those apps are leaking data they don’t have permission to obtain. The destination endpoint for the network traffic typically identifies the SDK responsible. most apps).
Let's personalize your content